15
IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA) SYSTEM SECURITY PLAN (SSP) ACME Consulting, LLC SCOPING: Name of System: [name of contractor’s internal, unclassified information system the SSP addresses] DUNS #: [contractor’s DUNS #] Contract #: [contractor’s contract # or other type of agreement description] CAGE Code #: [contractors CAGE code #] DISTRIBUTION: [list who this SSP is distributed to (e.g., contracting official, prime contractors, etc.)] REVISION DATE: [list the date of the last revision]

System Security Plan (SSP) Template - ComplianceForge

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

SYSTEM SECURITY PLAN (SSP)

ACME Consulting, LLC

SCOPING: Name of System: [name of contractor’s internal, unclassified information system the SSP addresses] DUNS #: [contractor’s DUNS #] Contract #: [contractor’s contract # or other type of agreement description] CAGE Code #: [contractors CAGE code #]

DISTRIBUTION: [list who this SSP is distributed to (e.g., contracting official, prime contractors, etc.)] REVISION DATE: [list the date of the last revision]

Page 2 of 133 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

TABLE OF CONTENTS PREPARED BY & RECORD OF CHANGES 4

PREPARED BY 4 REVISION HISTORY 4

OWNERSHIP & CYBERSECURITY OVERVIEW 5 CONTRACTS CONTAINING CUI 5 SYSTEM IDENTIFICATION - CUI OVERVIEW 5 KEY STAKEHOLDERS 5 DOCUMENTATION REPOSITORY 6 DATA PROTECTION CONSIDERATIONS 6 ADDITIONAL COMPLIANCE REQUIREMENTS 6

SYSTEM ENVIRONMENT 8 OPERATING MODEL 8 INTERCONNECTIVITY OVERVIEW 9 IDENTIFICATION & AUTHENTICATION OVERVIEW 9 SYSTEM COMPONENTS & NETWORK BOUNDARIES 9 ROLES & PRIVILEGES 12 SUPPLY CHAIN OVERVIEW 13 ONGOING MAINTENANCE & SUPPORT PLAN 13

SYSTEM DEVELOPMENT LIFE CYCLE (SDLC) 14 OPERATIONAL PHASE 14 MILESTONES 14

IDENTIFIED DEFICIENCIES & REMEDIATION PLAN 15 SECURITY REQUIREMENTS 15 IDENTIFIED CONTROL DEFICIENCIES 15 PLAN OF ACTION & MILESTONES (POA&M) SUMMARY 15

SYSTEM SECURITY PLAN (SSP) APPENDICES 16 APPENDIX A: DATA PROTECTION CONSIDERATIONS 16 APPENDIX B: HARDWARE AND SOFTWARE INVENTORY (HSI) 19 APPENDIX C: INTERCONNECTIVITY DOCUMENTATION 20 APPENDIX D: EXTERNAL SYSTEM CONNECTIONS 21 APPENDIX E: ADDITIONAL SECURITY CONSIDERATIONS 22 APPENDIX F: CYBERSECURITY ROLES & RESPONSIBILITIES 23

GLOSSARY: ACRONYMS & DEFINITIONS 32 ACRONYMS 32 DEFINITIONS 32

ANNEX 1 – SECURITY REQUIREMENTS (NIST 800-171 CUI & NFO CONTROLS) 33 NIST 800-171 APPENDIX D - 3.1 ACCESS CONTROL 33 NIST 800-171 APPENDIX D - 3.2 AWARENESS & TRAINING 47 NIST 800-171 APPENDIX D - 3.3 AUDIT & ACCOUNTABILITY 49 NIST 800-171 APPENDIX D - 3.4 CONFIGURATION MANAGEMENT 56 NIST 800-171 APPENDIX D - 3.5 IDENTIFICATION & AUTHENTICATION 63 NIST 800-171 APPENDIX D - 3.6 INCIDENT RESPONSE 69 NIST 800-171 APPENDIX D - 3.7 MAINTENANCE 73 NIST 800-171 APPENDIX D - 3.8 MEDIA PROTECTION 77 NIST 800-171 APPENDIX D - 3.9 PERSONNEL SECURITY 82 NIST 800-171 APPENDIX D - 3.10 PHYSICAL PROTECTION 84 NIST 800-171 APPENDIX D - 3.11 RISK ASSESSMENT 87 NIST 800-171 APPENDIX D - 3.12 SECURITY ASSESSMENT 90 NIST 800-171 APPENDIX D - 3.13 SYSTEM & COMMUNICATIONS PROTECTION 92 NIST 800-171 APPENDIX D - 3.14 SYSTEM & INFORMATION INTEGRITY 101 NON-FEDERAL ORGANIZATION (NFO) CONTROLS 105

Page 3 of 133 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

INSTRUCTION ON FILLING OUT THE SSP TEMPLATE

It is important to understand that there is no officially-sanctioned format for a System Security Plan (SSP) to meet NIST 800-171 compliance requirements. This template is based on SSP requirements that are used for other US government compliance requirements for SSPs, but it is tailored to document the entire Controlled Unclassified Information (CUI) environment for an organization. A key concept to keep in mind with the SSP is that it should be complete enough for a reasonable person to pick up, read through and understand the following information: What CUI is in regards to the company’s operations. Where CUI is stored, transmitted or processed. What controls are in place to protect CUI as it is stored, transmitted and processed. Any deficiencies that exist in protecting CUI, if applicable. Remediation plans address known deficiencies, if applicable.

Steps to fill out the SSP include: Step 1 – Read through the SSP template to get an understanding of the content required to fill out the template.

Step 2 – Start filling out the information you have available, using the examples as guidance, where applicable.

Step 3 – Work with stakeholders to fill in missing information.

Step 4 – Work through Annex 1 to provide evidence of how each of the applicable CUI and Non-Federal

Organization (NFO) controls are being addressed. Step 5 – For any CUI or NFO control that is not addressed, add an entry in the accompanying Plan of Action &

Milestones (POA&M) template Documentation Notes:

Text in BLACK are standard template text that are expected to be included in the SSP and should not be deleted unless necessary.

Text in RED are helpful instructions that need to be deleted as sections are completed. Text in BLUE are examples that need to be deleted as sections are completed.

Page 4 of 133 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

PREPARED BY & RECORD OF CHANGES

PREPARED BY [Name] [Email Address] [Phone #] [Department] REVISION HISTORY Version Date Pages Affected Description

1.0 TBD All Initial publish of SSP.

Page 5 of 133 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

OWNERSHIP & CYBERSECURITY OVERVIEW

The objective of the System Security Plan (SSP) document is to have a simple, easy-to-reference document that covers pertinent information about the Controlled Unclassified Information (CUI) environment. This is a “living document” that is meant to be updated as conditions change. The goal of this document is simple - anyone not familiar with the CUI environment should be able to read it and gain a fundamental understanding of the systems involved, the risks, and the security controls required to maintain an acceptable level of security. Essentially, this document provides a centralized repository for knowledge that is specific to the CUI environment and its applicable security controls. The SSP reflects input from those responsible for the systems that make up the CUI environment, including information owners, system operators, and other stakeholders. CONTRACTS CONTAINING CUI [list the applicable contracts that contain CUI protection requirements] SYSTEM IDENTIFICATION - CUI OVERVIEW [provide a descriptive narrative of how CUI is defined by the applicable contract(s). Include a description of the function/purpose of the internal unclassified information system(s)/network(s) that is(are) addressed in the plan.] Example: Contract XXXXXX defines CUI as schematic diagrams that are pertinent to the XYZ project. KEY STAKEHOLDERS CUI protection is a combined effort from the following stakeholders:

Stakeholder 1, Position Stakeholder 2, Position Stakeholder 3, Position

Example: It is sometimes worthwhile to include an organization chart, since this can assist with problem escalations.

CIO

Team 1 Team 2 Networking Technology

Technology Infrastructure

Page 6 of 133 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

DOCUMENTATION REPOSITORY Information security-related project and system documentation can be found at: [add URL for network share, etc.] DATA PROTECTION CONSIDERATIONS The assets within the CUI environment are assessed, based on data sensitivity and mission criticality, in order to ensure the appropriate level of protection is applied. Appendix A (Data Protection Considerations) provides the methodology for how data is classified in terms of data sensitivity and criticality to the CUI environment. ADDITIONAL COMPLIANCE REQUIREMENTS In addition to CUI protection requirements from the Defense Federal Acquisition Regulation Supplement (DFARS 252.204-7012), the following compliance requirements are also applicable, due to overlapping requirements for cybersecurity and privacy controls: STATUTORY REQUIREMENTS [fill-in applicable statutory requirements] Example statutory requirements include:

Cable Communications Policy Act (CCPA) Children’s Internet Protection Act (CIPA) Children’s Online Privacy Protection Act (COPPA) Computer Fraud and Abuse Act (CFAA) Consumer Credit Reporting Reform Act (CCRRA) Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM) Electronic Communications Privacy Act (ECPA) Electronic Freedom of Information Act (E-FOIA) Electronic Funds Transfer Act (EFTA) Fair & Accurate Credit Transactions Act (FACTA) Fair Credit Reporting Act (FCRA) Family Education Rights and Privacy Act (FERPA) Federal Information Security Management Act (FISMA) Federal Trade Commission Act (FTCA) Gramm Leach Bliley Act (GLBA) Health Insurance Portability and Accountability Act (HIPAA) Privacy Act Right to Financial Privacy Act (RFPA) Sarbanes Oxley Act (SOX) Telecommunications Act Telephone Consumer Protection Act (TCPA) Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001

(USA PATRIOT Act) Video Privacy Protection Act (VPPA) US State - Massachusetts 201 CMR 17.00 US State - Oregon Identity Theft Protection Act (ORS 646A) International - United Kingdom Data Protection Act (UK DPA)

REGULATORY REQUIREMENTS [fill-in applicable regulatory requirements] Example regulatory requirements include:

Federal Acquisition Regulation (FAR 52.204-21) European Union General Data Protection Regulation (EU GDPR)

Page 7 of 133 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

Financial Industry Regulatory Authority (FINRA) National Industrial Security Program Operating Manual (NISPOM) Department of Defense Information Assurance Risk Management Framework (DIARMF) (DoDI 8510.01) Federal Risk and Authorization Management Program (FedRAMP) New York Department of Financial Services (NY DFS) 23 NYCCRR 500 North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP)

CONTRACTUAL REQUIREMENTS [fill-in applicable contractual requirements] Example contractual requirements include:

Payment Card Industry Data Security Standard (PCI DSS) Generally Accepted Privacy Principles (GAPP) American Institute of CPAs Service Organization Control (AICPA SOC2) Center for Internet Security Critical Security Controls (CIS CSC) Cloud Security Alliance Cloud Controls Matrix (CSA CCM)

Page 8 of 133 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

SYSTEM ENVIRONMENT

This section contains a detailed topology narrative and graphic shall that clearly depicts the system environment, including system boundaries, system interconnections, and key components. Instruction: This does not require depicting every device, but would include an instance of operating systems in use, virtual and physical servers (e.g., file, print, web, database, application), as well as any networked workstations, firewalls, routers, switches, copiers, printers, lab equipment, etc. If components of other systems that interconnect/interface with this system need to be shown on the diagram, denote the system boundaries by referencing the security plans or names and owners of the other system(s) in the diagram. Include or reference (e.g., to an inventory database or spreadsheet) a complete hardware and software inventory, including make/model/version and maintenance responsibility. Delete this and all other instructions from your final version of this document. OPERATING MODEL

Operating Environment Where CUI Exists (check all that apply)

☐ Public Cloud Cloud services and infrastructure supporting multiple organizations and clients

☐ Private Cloud Cloud services and infrastructure dedicated to a specific organization and no other clients

☐ Data Center Company-owned & operated datacenter.

☐ Hybrid Explain: (e.g., cloud services and infrastructure that provides private cloud for secured applications and data where required and public cloud for other applications and data)

☐ Dispersed Endpoints CUI can be found on workstations and other endpoints.

☐ Other Explain:

High-Level Overview of Where CUI Is Stored, Transmitted or Processed (check all that apply)

☐ End User Workstations End user workstations (e.g., desktops & laptops)

☐ Mobile Devices Mobile devices (e.g., tablets or smartphones)

☐ Industrial Control System (ICS) Devices that control manufacturing processes

☐ Internal application/service Internal application (e.g., ERM, SAP, ticket system, change control, etc.)

☐ Software as a Service (SaaS) Web-based applications (e.g., Google Apps, Salesforce, GoToMeeting, WebEx)

☐ Platform as a Service (PaaS) Web-based major applications (e.g., Azure Cloud Services)

☐ Infrastructure as a Service (IaaS) Cloud environments (e.g., Azure, AWS, Rackspace)

☐ Other Explain: Example:

Page 9 of 133 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

INTERCONNECTIVITY OVERVIEW [provide a descriptive narrative how systems within the CUI environment communicate – is it internal only? Does it communicate outside of the company’s network?] Appendix B (Hardware and Software Inventory), provides a breakdown of assets that comprise the CUI environment in both the production and development instances. Appendix C (Interconnectivity Documentation), provides a detailed description of ports, protocols and services, in use within the CUI environment. IDENTIFICATION & AUTHENTICATION OVERVIEW [provide a descriptive narrative of how the system handles identification & authentication] Example: Vendor accounts will be created in the ACME instance and pushed to the XXXXX instance. Only one account per vendor will be allowed. The vendor account will be inactivated when the vendor submits their documentation. The two instances of XXXXX will use different methods for user identification and authentication, since the XXXXX-hosted instance will be externally accessible to vendors. ACME Instance

User Names: AD integration Passwords: AD integration Account Reviews: Tied into AD Account Deactivation: Tied into AD

XXXXX Instance

User Names: o ACME Users: Ping Federate (AD integration) o Non-ACME Users: Local XXXXX account (hosted instance only)

Passwords: o ACME Users: Ping Federate (AD integration) o Non-ACME Users: TBD

Account Reviews: o ACME Users: Ping Federate (AD integration) o Non-ACME Users: TBD

Account Deactivation: Tied into AD o ACME Users: Ping Federate (AD integration) o Non-ACME Users: TBD

SYSTEM COMPONENTS & NETWORK BOUNDARIES [provide a descriptive narrative of what makes up the CUI operating environment, including defining the assets involved and the system boundaries] Example: XYZ is designed with two distinct instances, running in two different environments:

Internal XXXXX instance that is housed in ACME’s datacenter (Datacenter 1); and Hosted XXXXX instance in Microsoft’s Azure private cloud.

Page 10 of 133 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

HIGH-LEVEL NETWORK DIAGRAM [add network diagram here] Instruction: Useful tools to create a high-level network diagram include: - Microsoft Visio (network diagram templates) or - Department of Homeland Security’s free tool, the Cyber Security Evaluation Tool (CSET) - https://ics-cert.us-cert.gov/sites/default/files/FactSheets/ICS-CERT_FactSheet_CSET_S508C.pdf Provide a diagram that portrays the system boundaries and all applicable connections and components, including the means for monitoring and controlling communications at the external boundary and at key internal boundaries within the system. Address all components and managed interfaces of the information system authorized for operation (e.g., routers, firewalls). Formal names of components as they are known by the project team in functional specifications, configuration guides, other documents and live configurations shall be named on the diagram and described. Components identified in the Boundary diagram should be consistent with the Network diagram and the inventory(ies). Provide a key to symbols used. Ensure consistency between the boundary and network diagrams and respective descriptions If necessary, include multiple network diagrams. Delete this and all other instructions from your final version of this document.

Page 14 of 133 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)

OPERATIONAL PHASE The CUI environment is currently:

Operational Status

☐ Operational CUI is being used by systems in a production environment.

☐ Under Development CUI is being used by systems in a developmental / testing environment.

☐ Major Modification CUI systems are undergoing a major change, development, or transition.

☐ Other Explain: The dates planned and dates reached for each phase of the System Development Lifecycle (SDLC) and Control Validation Testing (CVT) milestones:

Traditional SDLC Phase Date Planned Date Reached

Initiate ? ?

Develop / Design / Acquire ? ?

Implement ? ?

Operate & Maintain ? ?

Dispose ? ? MILESTONES [Enter a narrative about the planned milestones planned for the life of the systems that make up the CUI environment] Example: XYZ is currently in the operate phase. Updates and changes to XYZ is expected throughout the fiscal year. There are currently no envisioned alterations to XYZ that would severely affect its operational status during updates and changes to the system environment. XYZ will be undergoing major modification during the course of FY2018, including network engineering, security engineering, and systems engineering INSTRUCTIONS: All milestones about operational status should be stated. If the system is about to go through a major revision, all milestones along the way should be listed as well. Delete this and all other instructions from your final version of this document.

Page 33 of 133 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

ANNEX 1 – SECURITY REQUIREMENTS (NIST 800-171 CUI & NFO CONTROLS)

The SSP consists of the applicable NIST 800-53 rev4 controls, as mapped in Appendix D (CUI controls) and Appendix E (NFO controls) of NIST 800-171 rev1. NIST 800-171 APPENDIX D - 3.1 ACCESS CONTROL These controls are associated with access control: 3.1.1 LIMIT SYSTEM ACCESS TO AUTHORIZED USERS, PROCESSES ACTING ON BEHALF OF AUTHORIZED USERS, OR DEVICES (INCLUDING OTHER SYSTEMS). 3.1.2 LIMIT SYSTEM ACCESS TO THE TYPES OF TRANSACTIONS AND FUNCTIONS THAT AUTHORIZED USERS ARE PERMITTED TO EXECUTE. AC-2 ACCOUNT MANAGEMENT

Summary of Control Implementation

Implementation Status (check all that apply): ☐ Implemented (internally controlled) ☐ Implemented (outsourced execution of control) ☐ Partially Implemented (Identified in POA&M) ☐ Planned (Identified in POA&M) ☐ Alternative Implementation (Compensating Controls) ☐ Not applicable

Process Owner: [name of the individual or team accountable for the procedure being performed]

Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]

Occurrence: [how often the procedure need is performed]

Location of Additional Documentation: [location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]

Technology in Use: [if applicable, the name of the application/system/service used to perform the procedure]

Description of Control Implementation: [describe the solution and how it is implemented]

AC-3 ACCESS ENFORCEMENT

Summary of Control Implementation

Implementation Status (check all that apply): ☐ Implemented (internally controlled) ☐ Implemented (outsourced execution of control) ☐ Partially Implemented (Identified in POA&M) ☐ Planned (Identified in POA&M) ☐ Alternative Implementation (Compensating Controls) ☐ Not applicable

Process Owner: [name of the individual or team accountable for the procedure being performed]

Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]

Occurrence: [how often the procedure need is performed]

Location of Additional Documentation: [location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]

Technology in Use: [if applicable, the name of the application/system/service used to perform the procedure]

Description of Control Implementation:

Page 34 of 133 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

Summary of Control Implementation

[describe the solution and how it is implemented]

AC-17 REMOTE ACCESS

Summary of Control Implementation

Implementation Status (check all that apply): ☐ Implemented (internally controlled) ☐ Implemented (outsourced execution of control) ☐ Partially Implemented (Identified in POA&M) ☐ Planned (Identified in POA&M) ☐ Alternative Implementation (Compensating Controls) ☐ Not applicable

Process Owner: [name of the individual or team accountable for the procedure being performed]

Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]

Occurrence: [how often the procedure need is performed]

Location of Additional Documentation: [location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]

Technology in Use: [if applicable, the name of the application/system/service used to perform the procedure]

Description of Control Implementation: [describe the solution and how it is implemented]

3.1.3 CONTROL THE FLOW OF CUI IN ACCORDANCE WITH APPROVED AUTHORIZATIONS. AC-4 INFORMATION FLOW ENFORCEMENT

Summary of Control Implementation

Implementation Status (check all that apply): ☐ Implemented (internally controlled) ☐ Implemented (outsourced execution of control) ☐ Partially Implemented (Identified in POA&M) ☐ Planned (Identified in POA&M) ☐ Alternative Implementation (Compensating Controls) ☐ Not applicable

Process Owner: [name of the individual or team accountable for the procedure being performed]

Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]

Occurrence: [how often the procedure need is performed]

Location of Additional Documentation: [location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]

Technology in Use: [if applicable, the name of the application/system/service used to perform the procedure]

Description of Control Implementation: [describe the solution and how it is implemented]

Page 35 of 133 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

3.1.4 SEPARATE THE DUTIES OF INDIVIDUALS TO REDUCE THE RISK OF MALEVOLENT ACTIVITY WITHOUT COLLUSION. AC-5 SEPARATION OF DUTIES

Summary of Control Implementation

Implementation Status (check all that apply): ☐ Implemented (internally controlled) ☐ Implemented (outsourced execution of control) ☐ Partially Implemented (Identified in POA&M) ☐ Planned (Identified in POA&M) ☐ Alternative Implementation (Compensating Controls) ☐ Not applicable

Process Owner: [name of the individual or team accountable for the procedure being performed]

Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]

Occurrence: [how often the procedure need is performed]

Location of Additional Documentation: [location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]

Technology in Use: [if applicable, the name of the application/system/service used to perform the procedure]

Description of Control Implementation: [describe the solution and how it is implemented]

3.1.5 EMPLOY THE PRINCIPLE OF LEAST PRIVILEGE, INCLUDING FOR SPECIFIC SECURITY FUNCTIONS AND PRIVILEGED ACCOUNTS. AC-6 LEAST PRIVILEGE

Summary of Control Implementation

Implementation Status (check all that apply): ☐ Implemented (internally controlled) ☐ Implemented (outsourced execution of control) ☐ Partially Implemented (Identified in POA&M) ☐ Planned (Identified in POA&M) ☐ Alternative Implementation (Compensating Controls) ☐ Not applicable

Process Owner: [name of the individual or team accountable for the procedure being performed]

Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]

Occurrence: [how often the procedure need is performed]

Location of Additional Documentation: [location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]

Technology in Use: [if applicable, the name of the application/system/service used to perform the procedure]

Description of Control Implementation: [describe the solution and how it is implemented]

AC-6(1) LEAST PRIVILEGE | AUTHORIZE ACCESS TO SECURITY FUNCTIONS

Summary of Control Implementation

Implementation Status (check all that apply): ☐ Implemented (internally controlled)

Page 36 of 133 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

Summary of Control Implementation

☐ Implemented (outsourced execution of control) ☐ Partially Implemented (Identified in POA&M) ☐ Planned (Identified in POA&M) ☐ Alternative Implementation (Compensating Controls) ☐ Not applicable

Process Owner: [name of the individual or team accountable for the procedure being performed]

Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]

Occurrence: [how often the procedure need is performed]

Location of Additional Documentation: [location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]

Technology in Use: [if applicable, the name of the application/system/service used to perform the procedure]

Description of Control Implementation: [describe the solution and how it is implemented]

AC-6(5) LEAST PRIVILEGE | PRIVILEGED ACCOUNTS

Summary of Control Implementation

Implementation Status (check all that apply): ☐ Implemented (internally controlled) ☐ Implemented (outsourced execution of control) ☐ Partially Implemented (Identified in POA&M) ☐ Planned (Identified in POA&M) ☐ Alternative Implementation (Compensating Controls) ☐ Not applicable

Process Owner: [name of the individual or team accountable for the procedure being performed]

Process Operator: [name of the individual or team responsible to perform the procedure’s tasks]

Occurrence: [how often the procedure need is performed]

Location of Additional Documentation: [location where additional documentation can be found, e.g., policies, standards, procedures and other evidence]

Technology in Use: [if applicable, the name of the application/system/service used to perform the procedure]

Description of Control Implementation: [describe the solution and how it is implemented]

3.1.6 USE NON-PRIVILEGED ACCOUNTS OR ROLES WHEN ACCESSING NON-SECURITY FUNCTIONS. AC-6(2) LEAST PRIVILEGE | NON-PRIVILEGED ACCESS FOR NON-SECURITY FUNCTIONS

Summary of Control Implementation

Implementation Status (check all that apply): ☐ Implemented (internally controlled) ☐ Implemented (outsourced execution of control) ☐ Partially Implemented (Identified in POA&M) ☐ Planned (Identified in POA&M) ☐ Alternative Implementation (Compensating Controls)